tool | use |
---|---|
john | cracking passwords |
evil-winrm | opening remote shell to Windows machines |
nmap | scanning for targets, open ports, possible services and versions |
responder | checking http responses, maybe? |
gobuster | brute force directories, subdomains etc |
-sC: Performs a script scan using the default set of scripts. It is equivalent to --script=default.
-sV: Version detection
-v: Increases the verbosity level, causing Nmap to print more information about thescan in progress.
example: nmap -sC -sV -v $TARGET